Images List Premium Download Classic

Public Key

Public Key-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Methods and systems for re-securing a compromised channel in a satellite signal distribution environment
Bce Inc.
August 10, 2017 - N°20170230728

A method implemented by a set top box that encrypts communications for a channel stacking switch (cs) using a public key of the css, the method comprising: obtaining a message from a head end; extracting electronic counter measure (ecm) data from the message; sending the ecm data to the css; receiving, in response to the sending, a new public key ...
Certificate pinning using a directory service
Citrix Systems, Inc.
August 10, 2017 - N°20170230355

A user device obtains a set of one or more public key certificates for a server received from a directory service, and a current public key certificate of the server received from the server. The user device compares the current public key certificate received from the server with the set of public key certificates received from the directory service. If ...
Method and system for securing data
Citrix Systems, Inc.
August 10, 2017 - N°20170230352

A method and system for securing user data, or data, possessed by a data owner, are disclosed. In one aspect data is concealed and encrypted to ensure data confidentiality, and may also be signed to ensure data integrity and authenticity. In another aspect accesses to data are controlled by the data owner through a distributed access control system. In another ...
Public Key Patent Pack
Download 182+ patent application PDFs
Public Key Patent Applications
Download 182+ Public Key-related PDFs
For professional research & prior art discovery
inventor
  • 182+ full patent PDF documents of Public Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Technologies for remote attestation
Intel Corporation
August 10, 2017 - N°20170230182

Technologies for remote attestation include a group member device to generate a signature of a message using a cryptographic key assigned to the group member device by a group manager and determine an authentication path that indicates a plurality of cryptographic hashes necessary to compute a group public key of a group associated with a plurality of group member devices. ...
Encrypted code execution
Intel Corporation
August 10, 2017 - N°20170228548

Embodiments of an invention for encrypted code execution are disclosed. In one embodiment, a processor includes a private key, a code decryptor, and an encryption unit. The code decryptor is to decrypt the encrypted code to generate decrypted code, the encrypted code encrypted with a public key corresponding to the private key. The execution unit is to execute the decrypted ...
Communication system with pki key pair for mobile terminal
Giesecke & Devrient Gmbh
August 03, 2017 - N°20170223529

A pki key pair comprising a private key and a public key is arranged for the end device. The public key is stored at the communication partner. The communication partner is arranged to provide a session key, encrypt data using the session key, encrypt the session key using the public key and convey the encrypted data to the end device. ...
Public Key Patent Pack
Download 182+ patent application PDFs
Public Key Patent Applications
Download 182+ Public Key-related PDFs
For professional research & prior art discovery
inventor
  • 182+ full patent PDF documents of Public Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Hypersphere-based multivariable public key encryption/decryption system and method
South China University Of Technology
August 03, 2017 - N°20170222807

Disclosed is a hypersphere-based multivariable public key encryption/decryption system, which is composed of an encryption module and a decryption module, wherein the encryption module comprises a processor, and a public key transformation component for transforming plaintext into ciphertext; and the decryption module comprises a processor, a first affine transformation inversion component, a trapdoor component and a second affine transformation ...
Escrow key fragmentation system
Cocoon Data Holdings Pty Limited
August 03, 2017 - N°20170222805

A method of managing access to a key. The method comprises associating the key with an encrypted data object, the key being required to decrypt the data object; generating a number of fragments of the key, the number of fragments corresponding to a number of parties subject to a fragmentation agreement; and encrypting each fragment with a public key corresponding ...
Efficient methods for protecting identity in authenticated transmissions
Cocoon Data Holdings Pty Limited
August 03, 2017 - N°20170222801

Systems and methods are provided for protecting identity in an authenticated data transmission. For example, a contactless transaction between a portable user device and an access device may be conducted without exposing the portable user device's public key in cleartext. In one embodiment, an access device may send an access device public key to a portable user device. The user ...
Location based access for key retrieval
Cocoon Data Holdings Pty Limited
August 03, 2017 - N°20170222799

A method for key retrieval. The method comprises receiving, from a device, a request to access a key associated with an encrypted data object; identifying at least one policy associated with the key, the policy including requirements for a geographic origin of the request; receiving a signed location of the device, the location being signed using a private key associated ...
Symmetric encryption key generation/distribution
Red Hat, Inc.
July 27, 2017 - N°20170214670

Various examples are directed to systems and methods for exchanging encrypted information. A first computing device may select a first private key and generate a session key based at least in part on the first private key. The first computing device may receive from a second computing device a second public key and generate a first public key based at ...
Security chip and application processor
Samsung Electronics Co., Ltd.
July 27, 2017 - N°20170214662

A security chip and an application processor may be included in a device configured to engage in encrypted communications with an external client, including public key infrastructure communications, in an environment where a certificate authority is absent. The security chip may provide the application processor with a device public key from among a pair of device keys related to public ...
Authenticated remote pin unblock
Assa Abloy Ab
July 27, 2017 - N°20170214528

This invention provides a simple and secure pin unblock mechanism for use with a security token. A set of one or more passphrases are stored on a remote server during personalization. Likewise, the answers to the passphrases are hashed and stored inside the security token for future comparison. A local client program provides the user input and display dialogs and ...
Public Key Patent Pack
Download 182+ patent application PDFs
Public Key Patent Applications
Download 182+ Public Key-related PDFs
For professional research & prior art discovery
inventor
  • 182+ full patent PDF documents of Public Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Methods for fast, secure and privacy-friendly internet connection discovery in wireless networks
Palo Alto Research Center Incorporated
July 20, 2017 - N°20170208631

A method and system for verifying internet connectivity at an access point in a fast, secure, and privacy-friendly manner. During operation, the system may perform passive network discovery, challenge response discovery, and/or active discovery to verify internet connectivity for a mobile device. Passive network discovery involves the mobile device using a public key of a server to decrypt a ...
Identifying traffic associated with a content provider's toll-free data service campaign
Verizon Patent And Licensing Inc.
July 20, 2017 - N°20170208461

A device may receive, from a mobile device, first encrypted information, encrypted by a content provider device using a first private key, and at least one unencrypted identifier. The device may decrypt, using a first public key, the first encrypted information to obtain first information that may include second encrypted information, encrypted using a second public key. The device may ...
Mutual authentication method and authentication apparatus
Fujitsu Limited
July 20, 2017 - N°20170208062

A first device generates first encrypted data from a second public key corresponding to second id regarding a second device and a first random number and transmits first id regarding the first device, second id, and first encrypted data. The second device generates second encrypted data from a first public key corresponding to the first id and a second random ...
Key agreement method and device for verification information
Beijing Qihoo Technology Company Limited
July 20, 2017 - N°20170208049

Disclosed is a key agreement method for verification information. The method comprises: generating a key pair for encrypting and decrypting verification information in a terminal, transmitting a public key to a network device via a network, and storing a private key locally, wherein the verification information is a message used for verifying a terminal or user's identity or permission during ...
In-vehicle communication system
Renesas Electronics Corporation
July 20, 2017 - N°20170207922

The present invention is directed to solve a problem that time is required for a process related to verification of a public key certificate of a message sender. An in-vehicle device mounted on a vehicle has a memory for holding information of a device which failed in verification of a public key certificate. At the time of performing communication between ...
Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography
Mastercard International Incorporated
July 20, 2017 - N°20170207917

A method for distributing multiple cryptographic keys used to access data includes: receiving a data signal superimposed with an access key request, wherein the access key request includes at least a number, n, greater than 1, of requested keys; generating n key pairs using a key pair generation algorithm, wherein each key pair includes a private key and a public key; ...
Signed application cards
Quixey, Inc.
July 20, 2017 - N°20170207915

A device displays signed application cards. The device receives a card object that includes: an application function identifier that identifies an application function of a native application, a digital signature, and a certificate that comprises a public key. The device verifies the authenticity of the digital signature with the public key in the certificate. The device determines that the certificate ...
Computer-readable recording medium, shared key generation method, and information processing terminal
Fujitsu Limited
July 20, 2017 - N°20170207914

An information processing terminal generates a shared key by a public key cryptosystem using an identifier. The information processing terminal calculates a first calculation value by using an algorithm that outputs an element on an extension field of a prime field from two points on an additive cyclic group on an elliptic curve that is defined by the prime field. ...
Loading